Sign in

Source: https://www.hackthebox.eu/home/machines/profile/259

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
Summary | TL;DR
Parting Thoughts
— — — — — — — — — — — — — — — — — — — —

Introduction

This is the third machine in the starter series.

Scanning

Target IP: 10.10.10.46

Nmap Scan

nmap -sV -A -Pn $target

-sV : Probe open ports to determine service/version info
-A : Enable OS detection, version detection, script scanning, and traceroute
-Pn : Treat all hosts as…


Source: https://www.hackthebox.eu/home/machines/profile/259

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
Summary | TL;DR
Parting Thoughts
— — — — — — — — — — — — — — — — — — — —

Introduction

It is the second machine in the HTB-Starter series, and the difficulty rating is very easy. Oopsie hints towards a mistake. I am blogging while I am trying to solve so expect facing rabbit holes.


Source: https://www.hackthebox.eu/home/machines/profile/259

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
Summary | TL;DR
Parting Thoughts
— — — — — — — — — — — — — — — — — — — —

Introduction

Points — 5

This is supposed to be an easy box.

Scanning

Target IP: 10.10.10.194

Nmap Scan

nmap -sV -A -Pn $target

-sV : Probe open ports to determine service/version info
-A : Enable OS detection, version detection, script scanning, and traceroute
-Pn : Treat all…


Hi Guys,

I know it has been a lot of time since I published something here, I have been crazy busy with the office work, and I guess it’s time I finally get that OSCP cert that has been put on hold for a long time.

Since this is really time crucial and my lab has already expired while I only rooted some 10 boxes, I am going to go ahead with the following plan:
1. Read the PDF provided by Offensive Security
2. Follow TCM’s course on Priv Esc
3. Solve Vulnhub Challenges
4. Buy the labs for 15 days and wrap…


This is the mandatory post that I will always love, maybe owing to the fact that I am a software developer, this always has a special place in my heart.


Source: https://www.hackthebox.eu/home/machines/profile/263

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
Summary | TL;DR
Parting Thoughts
— — — — — — — — — — — — — — — — — — — —

Introduction

This is the second active machine that I am trying to solve.


Source: https://www.hackthebox.eu/home/machines/profile/254

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
— — — — — — — — — — — — — — — — — — — —

Introduction

At the time, when I am writing this blog, the machine is still live and this is the first time I am ever going to try doing this. Let’s hope I am able to root this.

Scanning

Target IP: 10.10.10.191

Nmap Scan

nmap -sV -A -Pn $target

-sV : Probe open…


This has a list of all the machines that are there in the Offensive Pentesting path on TryHackMe. This is just a collection of write-ups for all the machines that are included, and for a better hands-on experience, getting a subscription to the lab is highly recommended.

This path has 5 sub-paths:
1. Introduction
2. Getting Started
3. Proving It
4. Mastery
5. Extra Credit

Introduction

This part is essentially a guide to how to use the browser-based Kali services that they offer.

Getting Started

Vulnversityhttps://medium.com/shellpwn/tryhackme-vulnversity-807a6bc46764

Bluehttps://medium.com/shellpwn/blue-tryhackme-afd5098d109f

Kenobihttps://medium.com/shellpwn/tryhackme-kenobi-e2a76c67fb42

Proving It

Steel Mountainhttps://medium.com/shellpwn/steel-mountain-tryhackme-11f6ecdbd74d

Alfredhttps://medium.com/shellpwn/alfred-tryhackme-a6a6556a7f09

Hack Park


Introduction

Frankly a large part of my life, I have been scared of buffer overflows.
I know how that sounds, but honestly, I have no shame in that.
So finally, I gathered enough courage and thought I should give it a go.

What Helped

The following list of things worked like a charm:
1. Courage :P
2. The Cyber Mentor and his videos series.
3. The Buffer Overflow Room on TryHackMe by Tiberius.

How?

Well, first watch all the videos, there are only 8 in the series and they are pretty short as well.

Then move on to TryHackMe and start solving the buffer…


Source: https://www.hackthebox.eu/home/machines/profile/3

— — — — — — Table of Contents — — — — — —
Introduction
Scanning
— Enumeration
Vulnerability Analysis
Exploitation
Privesc
Summary | TL;DR
Parting Thoughts
— — — — — — — — — — — — — — — — — — — —

Introduction

Aaditya

OSCP Student

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store